Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:23
Static task
static1
Behavioral task
behavioral1
Sample
5782c88d97a340e2109153a5e312bea13d25b5a6a020d49904140a8eb8cc306f.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5782c88d97a340e2109153a5e312bea13d25b5a6a020d49904140a8eb8cc306f.xls
Resource
win10v2004-20220812-en
General
-
Target
5782c88d97a340e2109153a5e312bea13d25b5a6a020d49904140a8eb8cc306f.xls
-
Size
113KB
-
MD5
d541145d5ad12fdf037e0c84c6a53f3c
-
SHA1
93d6cde154203ebdc50fbfa7e09ee8fff8679ad3
-
SHA256
5782c88d97a340e2109153a5e312bea13d25b5a6a020d49904140a8eb8cc306f
-
SHA512
59de79d5d147e3edc4d406caf4995927c2a5f53c3f134c3b67f190243db08b7d64b56284fc75d1d6e705f77ba7bf5f6371c546dc6e3f6761b661998ffbe1e48a
-
SSDEEP
1536:Evvvqei5iecV9+iFU8j1VvaTbiGw2/v9zrvqg5iecV9+5FU8j1Vv5txXXMSRpiAt:jtxXXMmwZhpkRxDpLDm/YXhPnx
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1560 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE 1560 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5782c88d97a340e2109153a5e312bea13d25b5a6a020d49904140a8eb8cc306f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1560